- Products
- Learn
- Local User Groups
- Partners
- More
CheckMates Fifth Birthday
Celebrate with Us!
days
hours
minutes
seconds
Join the CHECKMATES Everywhere Competition
Submit your picture to win!
Check Point Proactive support
Free trial available for 90 Days!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
The 2022 MITRE Engenuity ATT&CK®
Evaluations Results Are In!
Now Available: SmartAwareness Security Training
Training Built to Educate and Engage
MITRE ATT&CK
Inside Check Point products!
CheckFlix!
All Videos In One Space
Hi guys,
I am getting some issues when working over a third party remote VPN connection through a Quantum Spark.
The Quantum Spark is configured in Bridge mode with all security services activated.
The third party VPN client establishes correctly and we are able to ping the remote servers.
As the RDP session is launched the VPN session is disconnected.
Attached is the error message seen in the logs.
Regards,
Are you sure this is the only log from that time of failed tunnel? It does not seem to be relevant to either RDP or VPN
Hi.
The 3rd party VPN client is DrayTek Smart VPN which is used to connect to a remote gateway over the Internet through the Quantum Spark. As per tests conducted the problem is observed when the Fast SSL option is activated on the VPN client.
When the Fast SSL option is activated on the client, the VPN session is established and ping to remote servers work fine. When initiating RDP sessions, the VPN session is disconnected.
When the Fast SSL option is disabled on the client, the VPN session is established and ping to remote servers work fine. RDP sessions also work seamlessly..
As per logs, a packet drop is noticed when initiating the sessions with the Fast SSL option activated.
See attachment.
Regards,
I could be wrong when I say this, but based on screenshot you attached, it would appear its potentially IPS issue, though it gives attack name, but there is no confidence level.
Andy
Please open a TAC case for this
Why not disable Fast SSL option ?
I'm not able to determine what "Fast SSL" means from the DrayTek documentation, but I did see that this setting is now disabled by default in the later 2019 releases. I'd guess perhaps it shortens the TCP retransmit timers so that it is more more "impatient", particularly when negotiating the initial HTTPS connection for the VPN. It is possible that it isn't getting a fast enough response for its impatience and is retransmitting before it is supposed to based on RTT, and running afoul of the Inspection Setting "Invalid TCP Retransmission". This enforcement will basically stall the HTTPS/443 connection in this case and result in the disconnection of the VPN.
Try changing the Inspection Setting "Invalid TCP Retransmission" from Drop to Accept on the firewall and see if Fast SSL still works. I'd really not advise leaving this protection in the Accept state though, and believe that disabling Fast SSL would be a better solution as clearly whatever that feature is doing is not RFC compliant.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY